The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.
Roundcube Webmail before 1.1.10, 1.2.x before 1.2.7, and 1.3.x before 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at the target system with a valid username/password as the attack requires an active session. The issue is related to file-based attachment plugins and _task=settings&_action=upload-display&_from=timezone requests.
Base Score: 4.6
Impact Score: 6.4
Exploitability Score: 3.9
Base Score: 7.8
Impact Score: 5.9
Exploitability Score: 1.8
cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:* versions up to 1.1.9 (inclusive)
|105977||Fedora 27 : roundcubemail (2017-cbc49efae8)||Nessus||Fedora Local Security Checks|
|104791||Debian DLA-1193-1 : roundcube security update||Nessus||Debian Local Security Checks|
|104688||Fedora 26 : roundcubemail (2017-1560290881)||Nessus||Fedora Local Security Checks|
|104508||FreeBSD : roundcube -- file disclosure vulnerability (f622608c-c53c-11e7-a633-009c02a2ab30)||Nessus||FreeBSD Local Security Checks|
|104486||Debian DSA-4030-1 : roundcube - security update||Nessus||Debian Local Security Checks|